The CrowdStrike Falcon® platform achieved 100% protection accuracy and 100% legitimacy accuracy with zero false positives, winning SE Labs’ first-ever endpoint detection and response (EDR) ransomware detection and protection test The Falcon platform detected and blocked 100% of ransomware files…
Category: Blog – crowdstrike.com
CrowdStrike Falcon Platform Achieves 100% Ransomware Prevention with Zero False Positives, Wins AAA Enterprise Advanced Security Award from SE Labs
The CrowdStrike Falcon® platform achieved 100% protection accuracy and 100% legitimacy accuracy with zero false positives, winning SE Labs’ first-ever endpoint detection and response (EDR) ransomware detection and protection test The Falcon platform detected and blocked 100% of ransomware files…
2022 Threat Hunting Report: Falcon OverWatch Looks Back to Prepare Defenders for Tomorrow’s Adversaries
Another turbulent year for cybersecurity finds itself right at home alongside global economic headwinds and geopolitical tensions. This year has been defined by rampant affiliate activity, a seemingly endless stream of new vulnerabilities and exploits, and the widespread abuse of…
Coming Soon to Las Vegas: Fal.Con 2022 Event Highlights and Special Guests
The countdown continues! As Fal.Con 2022 quickly approaches, we’re excited to share more information about the security industry visionaries and notable talks on the agenda for the sixth annual CrowdStrike conference for customers and cybersecurity professionals. IT and security practitioners…
Consolidated Identity Protection in a Unified Security Platform Is a Must-Have for the Modern SOC
As cyberattacks continue to grow relentlessly, enterprises have to continue improving their cyber defenses to stay one step ahead of the adversaries. One area that CISOs have recently started paying more attention is identity threat protection. This is not surprising…
Adversary Quest 2022 Walkthrough, Part 3: Four PROTECTIVE PENGUIN Challenges
In July 2022, the CrowdStrike Intelligence Advanced Research Team hosted the second edition of our Adversary Quest. As in the previous year, this “capture the flag” event featured 12 information security challenges in three different tracks: eCrime, Hacktivism and Targeted…
GitOps and Shift Left Security: The Changing Landscape of DevSecOps
Application developers have always had a tricky balance to maintain between speed and security, two requirements that may often feel at odds with each other. Practices that increase speed also pressure development teams to ensure that vulnerable code is identified…
The Anatomy of Wiper Malware, Part 2: Third-Party Drivers
In Part 1 of this four-part blog series examining wiper malware, we introduced the topic of wipers, reviewed their recent history and presented common adversary techniques that leverage wipers to destroy system data. In Part 2, CrowdStrike’s Endpoint Protection Content…
Securing Our Nation: How the Infrastructure Investment and Jobs Act Delivers on Cyber Resiliency
Attacks and intrusions on our nation’s vital infrastructure — our electrical grid, water systems, ports and oil supply — are on the rise. For example, as reported by the Pew Charitable Trust in March 2021, hackers changed the chemical mixture…
CrowdStrike’s Adversary Universe World Tour: Coming to a City Near You!
And we’re off! The CrowdStrike Adversary Universe® World Tour (AUWT) kicked off with a standing-room-only event in Brisbane, Australia on July 12, 2022, followed by another full house in Melbourne on July 18. We’re excited to begin this tour and…
Think It, Build It, Secure It — CrowdStrike at AWS re:Inforce 2022
For two days in July, Boston will be the epicenter of innovation in the world of cloud security — and we’re excited to see you there in person! As a proud sponsor of AWS re:Inforce 2022 (July 26-27), CrowdStrike is…
Your Current Endpoint Security May Be Leaving You with Blind Spots
This article has been indexed from Blog – crowdstrike.com Threat actors are continuously honing their skills to find new ways to penetrate networks, disrupt business-critical systems and steal confidential data. In the early days of the internet, adversaries used file-based…
CrowdStrike Named a Strong Performer in 2022 Forrester Wave for Cloud Workload Security
This article has been indexed from Blog – crowdstrike.com “In its current CWS offering, the vendor has great CSPM capabilities for Azure, including detecting overprivileged admins and enforcing storage least privilege and encryption, virtual machine, and network policy controls.” –…
Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack
This article has been indexed from Blog – crowdstrike.com In an effort to stay ahead of improvements in automated detections and preventions, adversary groups continually look to new tactics, techniques and procedures (TTPs), and new tooling to progress their mission…
CrowdStrike and Cloud Security Alliance Collaborate to Enable Pervasive Zero Trust
This article has been indexed from Blog – crowdstrike.com The security problems that plague organizations today actually haven’t changed much in 30 years. Weak and shared passwords, misconfigurations and vulnerabilities are problems that have tormented the industry for years and…
PROPHET SPIDER Exploits Citrix ShareFile Remote Code Execution Vulnerability CVE-2021-22941 to Deliver Webshell
This article has been indexed from Blog – crowdstrike.com At the start of 2022, CrowdStrike Intelligence and CrowdStrike Services investigated an incident in which PROPHET SPIDER exploited CVE-2021-22941 — a remote code execution (RCE) vulnerability impacting Citrix ShareFile Storage Zones…
The Easy Solution for Stopping Modern Attacks
This article has been indexed from Blog – crowdstrike.com Modern cyberattacks are multifaceted, leveraging different tools and techniques and targeting multiple entry points. As noted in the CrowdStrike 2022 Global Threat Report, 62% of modern attacks do not use traditional…
CrowdStrike Falcon Enhances Fileless Attack Detection with Intel Accelerated Memory Scanning Feature
This article has been indexed from Blog – crowdstrike.com CrowdStrike introduces accelerated memory scanning into the CrowdStrike Falcon® sensor for Windows to enhance existing visibility and detection of fileless threats The Falcon sensor integrates Intel® Threat Detection Technology (Intel® TDT)…
CrowdStrike Falcon Enhances Fileless Attack Detection with Accelerated Memory Scanning Feature
This article has been indexed from Blog – crowdstrike.com CrowdStrike introduces memory scanning into the CrowdStrike Falcon® sensor for Windows to enhance existing visibility and detection of fileless threats The Falcon sensor integrates Intel threat detection technology to perform accelerated…
How a Strong Identity Protection Strategy Can Accelerate Your Cyber Insurance Initiatives
This article has been indexed from Blog – crowdstrike.com The growth in frequency and severity of cyberattacks has caused organizations to rethink their security strategies. Major recent security threats, such as high-profile ransomware attacks and the Log4Shell vulnerabilities disclosed in…
Reinventing Managed Detection and Response (MDR) with Identity Threat Protection
This article has been indexed from Blog – crowdstrike.com The modern threat landscape continues to evolve with an increase in attacks leveraging compromised credentials. An attacker with compromised credentials too frequently has free reign to move about an organization and…
Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities
This article has been indexed from Blog – crowdstrike.com Summary On Feb. 23, 2022, destructive attacks were conducted against Ukrainian entities. Industry reporting has claimed the Go-based ransomware dubbed PartyTicket (or HermeticRansom) was identified at several organizations affected by the…
CrowdStrike Falcon Protects from New Wiper Malware Used in Ukraine Cyberattacks
This article has been indexed from Blog – crowdstrike.com On Feb. 23, 2022, a new wiper malware was reported targeting Ukraine systems The wiper destroys files on infected Windows devices by corrupting specific elements of connected hard drives CrowdStrike Intelligence…
Data Protection 2022: New U.S. State Laws Reflect Convergence of Privacy and Security Requirements
This article has been indexed from Blog – crowdstrike.com Many countries around the world recognized Data Protection Day in January — a day that highlights the importance of protecting individual privacy and data against misuse. The U.S. celebrated Data Privacy…
Nowhere to Hide: Detecting a Vishing Intrusion at a Retail Company
This article has been indexed from Blog – crowdstrike.com The CrowdStrike Falcon OverWatch™ 2021 Threat Hunting Report details the interactive intrusion activity observed by hunters from July 2020 to June 2021. While the report brings to light some of the…
Protecting Cloud Workloads with CrowdStrike and AWS
This article has been indexed from Blog – crowdstrike.com Migrating to the cloud has allowed many organizations to reduce costs, innovate faster and deliver business results more effectively. However, as businesses expand their cloud investments, they must adapt their security…
CrowdStrike Automates Vulnerability Remediation Processes While Enhancing SecOps Visibility
This article has been indexed from Blog – crowdstrike.com Adversaries are becoming more adept and sophisticated in their attacks. Taking advantage of vulnerabilities present in major software is often an attractive entry point for establishing a campaign within an enterprise…
Access Brokers: Who Are the Targets, and What Are They Worth?
This article has been indexed from Blog – crowdstrike.com Access brokers have become a key component of the eCrime threat landscape, selling access to threat actors and facilitating myriad criminal activities. Many have established relationships with big game hunting (BGH)…
Why the Most Effective XDR Is Rooted in Endpoint Detection and Response
This article has been indexed from Blog – crowdstrike.com Extended detection and response (XDR) solutions deliver powerful capabilities to help security teams fight adversaries by increasing visibility, simplifying operations and accelerating identification and remediation across the security stack. XDR platforms…
CrowdStrike Research Investigates Exploit Behavior to Strengthen Customer Protection
This article has been indexed from Blog – crowdstrike.com CrowdStrike continuously observes and researches exploit behavior to strengthen protection for customers Code execution techniques constantly target Windows, Linux and macOS operating systems Successful remote/arbitrary code execution can enable a foothold…
How to Automate Workflows with Falcon Spotlight
This article has been indexed from Blog – crowdstrike.com Introduction Falcon Spotlight leverages the existing Falcon Agent to assess the status of vulnerabilities across the environment. While visibility and filtering capabilities are part of the user interface, this article will…
New Mercedes-AMG F1 W13 E Rises to the Challenge for Formula One 2022
This article has been indexed from Blog – crowdstrike.com The year 2022 is a transformational one for F1. It’s hard to overstate just how much has changed to the regulations that govern this sport — the fact that those regulations…
CrowdStrike Partners with MITRE CTID, Reveals Real-world Insider Threat Techniques
This article has been indexed from Blog – crowdstrike.com Remote working has exposed companies to greater levels of insider risk, which can result in data exfiltration, fraud and confidential information leakage CrowdStrike is a founding sponsor and lead contributor to…
Defend Against Ransomware and Malware with Falcon Fusion and Falcon Real Time Response
This article has been indexed from Blog – crowdstrike.com Adversaries are moving beyond malware and becoming more sophisticated in their attacks by using legitimate credentials and built-in tools to evade detection by traditional antivirus products. According to the CrowdStrike 2022…
2022 Global Threat Report: A Year of Adaptability and Perseverance
This article has been indexed from Blog – crowdstrike.com For security teams on the front lines and those of us in the business of stopping cyberattacks and breaches, 2021 provided no rest for the weary. In the face of massive…